Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gtk vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-0983
IRC client irssi in irssi-text prior to 0.8.4 allows remote malicious users to cause a denial of service (crash) via an IRC channel that has a long topic followed by a certain string, possibly triggering a buffer overflow.
Irssi Irssi 0.8.4
5.1
CVSSv2
CVE-2005-3354
Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed prior to 2.1.6 allows user-assisted malicious users to execute arbitrary code by having local users import LDIF files with long lines.
Sylpheed Sylpheed 0.9.5
Sylpheed Sylpheed 0.9.6
Sylpheed Sylpheed 1.0.3
Sylpheed Sylpheed 1.0.4
Sylpheed Sylpheed 2.1.2
Sylpheed Sylpheed 2.1.3
Sylpheed Sylpheed 0.9.7
Sylpheed Sylpheed 0.9.8
Sylpheed Sylpheed 2.0
Sylpheed Sylpheed 2.0.1
Sylpheed Sylpheed 2.1.4
Sylpheed Sylpheed 2.1.5
Sylpheed Sylpheed 0.9.11
Sylpheed Sylpheed 0.9.12
Sylpheed Sylpheed 0.9.4
Sylpheed Sylpheed 1.0.1
Sylpheed Sylpheed 1.0.2
Sylpheed Sylpheed 2.1
Sylpheed Sylpheed 2.1.1
Sylpheed Sylpheed 0.8.11
Sylpheed Sylpheed 0.9.10
Sylpheed Sylpheed 0.9.9
6.8
CVSSv2
CVE-2006-7227
Integer overflow in Perl-Compatible Regular Expression (PCRE) library prior to 6.7 allows context-dependent malicious users to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), whi...
Pcre Pcre
4.3
CVSSv2
CVE-2006-7230
Perl-Compatible Regular Expression (PCRE) library prior to 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent malicious users to ca...
Pcre Pcre
5.1
CVSSv2
CVE-2005-2972
Multiple stack-based buffer overflows in the RTF import feature in AbiWord prior to 2.2.11 allow user-assisted malicious users to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) H...
Abisource Community Abiword
5
CVSSv2
CVE-2006-4089
Multiple buffer overflows in Andy Lo-A-Foe AlsaPlayer 0.99.76 and previous versions allow remote malicious users to cause a denial of service (application crash), or have other unknown impact, via (1) a long Location field sent by a web server, which triggers an overflow in the r...
Andy Lo-a-foe Alsaplayer
1 EDB exploit
6.8
CVSSv2
CVE-2006-7228
Integer overflow in Perl-Compatible Regular Expression (PCRE) library prior to 6.7 might allow context-dependent malicious users to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calcula...
Pcre Pcre
7.5
CVSSv2
CVE-2001-0928
Buffer overflow in the permitted function of GNOME gtop daemon (libgtop_daemon) in libgtop 1.0.13 and previous versions may allow remote malicious users to execute arbitrary code via long authentication data.
Gnome Libgtop Daemon 1.0.12
Gnome Libgtop Daemon 1.0.13
Gnome Libgtop Daemon 1.0.6
Gnome Libgtop Daemon 1.0.7
Gnome Libgtop Daemon 1.0.9
NA
CVE-2023-23598
Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects F...
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Thunderbird
2.1
CVSSv2
CVE-2005-2097
xpdf and kpdf do not properly validate the "loca" table in PDF files, which allows local users to cause a denial of service (disk consumption and hang) via a PDF file with a "broken" loca table, which causes a large temporary file to be created when xpdf attem...
Kde Kpdf
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0 Pl2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »